Abstract

Now a days, cloud computing is an emerging and way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed compu-ting. Today cloud computing is used in both industrial, research and academic field. Cloud facilitates its users by providing virtual resources via internet. As the field of cloud computing is spreading the new techniques are developing. This increase in cloud computing environment also increases security challenges for cloud developers. Users of cloud save their data in the cloud hence the lack of security in cloud can lose the user’s trust.In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy, elasticity, reliability, availability etc in various sectors, the paper also discuss existing security techniques and approaches for a secure cloud environment. This paper will enable researchers and professionals to know about different security threats and models and tools proposed.

Highlights

  • A days is a critical requirement to securely storage, managing, sharing and analyze massive, vastamounts of complex data organizing to determine various patterns and trends in proper orderly to improve the high quality of healthcare, much better safeguard the nation and explores alternative different sources of energy

  • The general definition of cloud computing was provided by National Institute of Standards and Technology (NIST), USA says that: "Cloud computing is a technical model for enabling on-demand servicesand user convenient network access to a shared vast of configurable computing resources that can be rapidly growth provisioned and released with needed minimum management efforts or service provider interaction in existing environment

  • This paper we describe some of the cloud security concepts and demonstrate the cloud computing platform properties such as scalability, platform independent, low-cost, elasticity and reliability

Read more

Summary

Introduction

A days is a critical requirement to securely storage , managing , sharing and analyze massive, vastamounts of complex data organizing (for example: semi-structuredoriented and unstructured oriented ) to determine various patterns and trends in proper orderly to improve the high quality of healthcare, much better safeguard the nation and explores alternative different sources of energy. The general definition of cloud computing was provided by National Institute of Standards and Technology (NIST), USA says that: "Cloud computing is a technical model for enabling on-demand servicesand user convenient network access to a shared vast of configurable computing resources (for example:Networks operations, Client-servers process, cloud storage applications and their services) that can be rapidly growth provisioned and released with needed minimum management efforts or service provider interaction in existing environment. For another case it is general a paradigm that provides required computing resources and storage while for others it is just a way to access software and data operations from the cloud computing. The use of asset will be calculated through directed, estimated, and accused for contributor and asset

Cloud computing
Authentication
Cloud storage
Forward security
Existing work
Multi-tenancy
Elasticity
Insider attacks
Outsider attacks
Data loss
Network security
Malware injection attack problems
Flooding attack problem
Proposed system
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.